Showing 3,521 - 3,540 results of 8,265 for search '"mobilization"', query time: 0.09s Refine Results
  1. 3521

    National key information infrastructure:status,international comparison and policy recommedations by Sude QING, Yang SONG, Li ZHAO, Lei CAO

    Published 2017-08-01
    “…2015 is the year when “the 12th Five-year Plan” fully completed,and “the 13th Five-year Plan” starts.To discover problems,judge trends and solve problems are the top priorities in the first year of planning.According to“Global Information Technology Report 2015”that released by World Economic Forum,China is also facing three weaknesses,such as the low per capita internet bandwidth,the limited mobile broadband penetration and the urgent need of innovation environment.Situation analysis and international comparison were presented,and policy recommendations were given from three major aspects,such as improving broadband capabilities,developing Aerospace integrated networks and innovative application environments,which break down into six sub-directions such as domestic broadband networks,international network layout,mobile communications,space infrastructure,application infrastructure and software-defined network.…”
    Get full text
    Article
  2. 3522

    Micro-station sleeping algorithm based on coverage area priority in 5G network by Ziren WANG, Yi LI

    Published 2022-07-01
    “…With the maturity of 5G mobile communication technology and the rapid growth of the number of mobile terminals, the problem of intensive energy consumption of 5G wireless communication system base stations is prominent.A micro base station area hierarchical sleep algorithm was proposed.Considering the impact of micro base station load, inter station distance and inter layer cooperation on micro base station sleep, the transitions number of the micro base station in the overlapping coverage area between macro base stations is less, and the priority sleep operation has a good energy-saving effect.The simulation result shows that the energy-saving rate is 23%, which can adapt to different network sizes, and the energy-saving effect is better in large-scale networks.…”
    Get full text
    Article
  3. 3523

    An overview of low resolution quantization in wireless communication system by Dan QIAO, Chaokai WEN, Feifei GAO, Shi JIN

    Published 2017-06-01
    “…Compared to the 4th generation (4G) mobile communication technology,the 5th generation (5G) mobile communication technology will provide tens of times of peak rate increase,reaching up to several thousands megabit per second.The coming wireless communication systems face the problems of expensive hardware cost and high power consumption,which is becoming a bottleneck of high-rate communication systems.To cope with these problems,redesigning communication systems with the receiver using finite precision analog-to-digital converters (ADC) is one possible approach.The analysis of recent information theory for the AWGN channel shows that the performance loss due to 2~3 bit ADC acceptable.The application of low resolution quantization in wireless communication systems was focused on,an overview of the channel capacity and receiver design under low-precision ADC was provided.…”
    Get full text
    Article
  4. 3524

    Les nouveaux outils de la tricherie scolaire au lycée by Christophe Michaut

    Published 2013-06-01
    “…With the arrival of mobile phones in classrooms and common use of the Internet in school activities, students have more opportunities to plagiarize documents or defraud during the tests on the table. …”
    Get full text
    Article
  5. 3525

    An Empirical Study on Ad Hoc Performance of DSRC and Wi-Fi Vehicular Communications by Seungbae Lee, Alvin Lim

    Published 2013-11-01
    “…Also, it identifies important effects of messages size, message frequency, weather condition, and vehicle mobility on vehicular communications. For example, rainy weather significantly diminishes the communication range and vehicle mobility causes temporal variations in communication throughput. …”
    Get full text
    Article
  6. 3526

    La division sexuelle du travail militant dans les assemblées générales : le cas des mouvements de « sans » by Xavier Dunezat

    Published 2008-09-01
    “…This analysis leans on participating observations during unemployed mobilizations in 1998 (in Rennes and in Morlaix in Brittany) and illegal immigrant's mobilizations in the 2000s. …”
    Get full text
    Article
  7. 3527

    Research on service-driven network technologies for space-air-ground-sea integration by FAN Kexin, AN Lirong, ZHANG Qinyu

    Published 2024-06-01
    “…Then, driven by the demand for carrying massive diverse services, key network technologies, including network slicing, mobile edge computing, and communication-sensing-computing integration, were investigated. …”
    Get full text
    Article
  8. 3528

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  9. 3529

    Location privacy protection technology based on KHINN by Lijin ZHUANG, Yuyi OU, Jie LING

    Published 2016-09-01
    “…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
    Get full text
    Article
  10. 3530

    Green Finance in Europe — Strategy, Regulation and Instruments by Volker Brühl

    Published 2021-12-01
    “…Abstract A green transformation of nearly all parts of our economy is necessary, including but not limited to energy production and consumption, mobility, manufacturing and agriculture.…”
    Get full text
    Article
  11. 3531

    STRUCTURAL ASPECTS OF PLASTICITY LOWERING OF HIGH-STRENGTH WIRE AT BIG CUMULATIVE COMPRESSIONS by V. P. Fetisov

    Published 2012-11-01
    “…It is shown that decrease of plasticity of high-strength wire at big total cobbings is connected with reduction of mobility of dislocations in the substructure formed at loss of perlite lamellar structure.…”
    Get full text
    Article
  12. 3532

    Effect of Processing Parameters on Performance of Spray-Deposited Organic Thin-Film Transistors by Jack W. Owen, Natalia A. Azarova, Marsha A. Loth, Markos Paradinas, Mariona Coll, Carmen Ocal, John E. Anthony, Oana D. Jurchescu

    Published 2011-01-01
    “…Our results demonstrate that we can tune the field-effect mobility of spray-deposited devices two orders of magnitude, from 10−3 cm2/Vs to 10−1 cm2/Vs, by controlling fabrication parameters.…”
    Get full text
    Article
  13. 3533

    Türkiye’de SMS Reklamları: Tüketici Tutumlarını Etkileyen Faktörler by Hasan Kemal Suher, Nevzat Bilge İspir

    Published 2009-02-01
    “…Mobile telefonların kullanımdaki hızlıartışhem pazarlamacılar hem de reklamcılar için yeni bir taşıma platformu yaratmıştır. …”
    Get full text
    Article
  14. 3534

    Observational Study of Pedestrian Behavior at Signalized Crosswalks by Damian Frej

    Published 2025-01-01
    “…The pedestrian behavior at five signalized crosswalks in Kielce, was analyzed in this study with a particular focus on the increasing use of mobile phones and other electronic devices while crossing the street. …”
    Get full text
    Article
  15. 3535

    A Novel Robust Tracking Algorithm in Cluttered Environments for Distributed Sensor Network by Yunting Liu, Yuanwei Jing, Siying Zhang, Hui Guo

    Published 2013-12-01
    “…Simulation results show that the proposed algorithm can track the mobile node and estimate the position with relatively higher accuracy in comparison with existing methods.…”
    Get full text
    Article
  16. 3536

    Electric Vehicles and Storage Systems Integrated within a Sustainable Urban District Fed by Solar Energy by Stefano Bracco, Federico Delfino, Michela Longo, Silvia Siri

    Published 2019-01-01
    “…Many scenarios are analyzed and discussed, with specific attention to evaluate the role of electric mobility within a smart energy infrastructure and a focus on EVs acting as mobile storage systems.…”
    Get full text
    Article
  17. 3537

    Early Implant Placement with Immediate Loading in the Mandibular Anterior Region: A Rapid Solution to Edentulism by Arjun Hari Rijal, Bhageshwar Dhami, Pratistha Ghimire, Manoj Humagain, Simant Lamichhane

    Published 2023-01-01
    “…On intraoral examination, there was a mobile tooth with respect to 41. The mobile tooth was extracted, and early implant placement was done along with Bio-Oss bone grafts to fill the jumping distance with no barrier membrane. …”
    Get full text
    Article
  18. 3538

    Las canciones del 15-M y su memoria. El sonido de un compromiso político by José Rafael Ramos Barranco

    Published 2022-07-01
    “…The 15-M movement meant much more than social mobilizations against the measures imposed by the government that led to a critical situation for thousands of Spanish families. …”
    Get full text
    Article
  19. 3539

    La movilidad de los inmigrantes emprendedores con iniciativas culturales y creativas en la Comunidad de Madrid by OSORIO GARCÍA-OTEYZA, Miguel, JIMÉNEZ-SOSA, Mirian

    Published 2018-05-01
    “…However, ICT facilitates new migratory flows, such as the mobility of 7entrepreneurs of art and culture. Cultural and creative industries, besides being a resource for economic mobility, are also a source of identity, create a sense of belonging and facilitate social cohesion.…”
    Get full text
    Article
  20. 3540

    E-k Relation of Valence Band in Arbitrary Orientation/Typical Plane Uniaxially Strained by Zhang Chao, Xu Da-Qing, Liu Shu-Lin, Liu Ning-Zhuang

    Published 2014-01-01
    “…Uniaxial strain technology is an effective way to improve the performance of the small size CMOS devices, by which carrier mobility can be enhanced. The E-k relation of the valence band in uniaxially strained Si is the theoretical basis for understanding and enhancing hole mobility. …”
    Get full text
    Article